Sciweavers

6506 search results - page 1149 / 1302
» Algorithmic models for sensor networks
Sort
View
COMCOM
2002
189views more  COMCOM 2002»
14 years 10 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
ANOR
2011
96views more  ANOR 2011»
14 years 5 months ago
Global propagation of side constraints for solving over-constrained problems
This article deals with the resolution of over-constrained problems using constraint programming, which often imposes to add to the constraint network new side constraints. These ...
Thierry Petit, Emmanuel Poder
SIGIR
2011
ACM
14 years 28 days ago
Time-based query performance predictors
Query performance prediction is aimed at predicting the retrieval effectiveness that a query will achieve with respect to a particular ranking model. In this paper, we study quer...
Nattiya Kanhabua, Kjetil Nørvåg
TON
2010
157views more  TON 2010»
14 years 4 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
DSN
2007
IEEE
15 years 4 months ago
Electing an Eventual Leader in an Asynchronous Shared Memory System
This paper considers the problem of electing an eventual leader in an asynchronous shared memory system. While this problem has received a lot of attention in messagepassing syste...
Antonio Fernández, Ernesto Jiménez, ...
« Prev « First page 1149 / 1302 Last » Next »